scientific article; zbMATH DE number 2086725
From MaRDI portal
Publication:4737264
zbMATH Open1056.94514MaRDI QIDQ4737264FDOQ4737264
Authors: Ben Lynn
Publication date: 11 August 2004
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2332/23320466.htm
Title of this publication is not available (Why is that?)
Recommendations
Cited In (87)
- Tightly secure (H)IBE in the random oracle model
- Reflections on the security proofs of Boneh-Franklin identity-based encryption scheme
- CCA-secure identity-based matchmaking encryption from standard assumptions
- Use of ID-based cryptography for the efficient verification of the integrity and authenticity of web resources
- A survey on functional encryption
- Efficient updatable public-key encryption from lattices
- HIERARCHICAL IDENTITY-BASED PROXY RE-ENCRYPTION WITHOUT RANDOM ORACLES
- HIBE: hierarchical identity-based encryption
- Forward-secure encryption with fast forwarding
- Unique-path identity based encryption with applications to strongly secure messaging
- Hierarchical Identity-Based Identification Schemes
- Title not available (Why is that?)
- Traceable receipt-free encryption
- ID-based public key cryptographic systems
- Compact hierarchical IBE from lattices in the standard model
- SecHome: a secure large-scale smart home system using hierarchical identity based encryption
- Cost-effective and scalable data sharing in cloud storage using hierarchical attribute-based encryption with forward security
- Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts
- An efficient IBE scheme with tight security reduction in the random oracle model
- Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters’ IBE Scheme
- Efficient identity-based encryption with hierarchical key-insulation from HIBE
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption
- Securing information exchange in VANETs by using pairing-based cryptography
- Attribute-based encryption with fast decryption
- Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks
- Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
- Efficient selective identity-based encryption without random oracles
- An Identity-Based Key Agreement Protocol for the Network Layer
- Title not available (Why is that?)
- Privacy-preserving encryption scheme using DNA parentage test
- Multi-key Hierarchical Identity-Based Signatures
- Secure Hierarchical Identity Based Encryption Scheme in the Standard Model
- Multi-Identity Single-Key Decryption without Random Oracles
- Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
- Unbounded HIBE with tight security
- Revocable hierarchical identity-based encryption with adaptive security
- You can sign but not decrypt: hierarchical integrated encryption and signature
- Trapdoor delegation and HIBE from middle-product LWE in standard model
- Direct chosen-ciphertext secure identity-based key encapsulation without random oracles
- Hierarchical identity-based encryption with tight multi-challenge security
- Fine-grained forward secrecy: allow-list/deny-list encryption and applications
- On indifferentiable hashing into the Jacobian of hyperelliptic curves of genus 2
- On the power of hierarchical identity-based encryption
- Identity-based encryption in DDH hard groups
- Generic constructions for fully secure revocable attribute-based encryption
- Identity-Based Online/Offline Encryption
- Efficient revocable identity-based encryption via subset difference methods
- On the Impossibility of Virtual Black-Box Obfuscation in Idealized Models
- Wildcarded identity-based encryption
- Generic constructions of integrated PKE and PEKS
- Policy controlled system with anonymity
- The relation and transformation between hierarchical inner product encryption and spatial encryption
- Extended dual system group and shorter unbounded hierarchical identity based encryption
- Revocable hierarchical identity-based encryption via history-free approach
- Revocable hierarchical identity-based encryption with shorter private keys and update keys
- Updatable public key encryption in the standard model
- Identity-based encryption and hierarchical identity-based encryption
- Simplified revocable hierarchical identity-based encryption from lattices
- Verifiable security of Boneh-Franklin identity-based encryption
- Relations between semantic security and anonymity in identity-based encryption
- Supporting dynamic updates in storage clouds with the Akl-Taylor scheme
- New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
- Bonsai trees, or how to delegate a lattice basis
- Practical Identity-Based Encryption Without Random Oracles
- Ciphertext-policy delegatable hidden vector encryption and its application to searchable encryption in multi-user setting
- Hierarchical Identity Based Encryption with Polynomially Many Levels
- Fine-grained secure attribute-based encryption
- Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts
- Adaptive-ID Secure Revocable Identity-Based Encryption
- Anonymous HIBE with short ciphertexts: full security in prime order groups
- Fine-grained secure attribute-based encryption
- Generalized Identity Based and Broadcast Encryption Schemes
- Generic construction of designated tester public-key encryption with keyword search
- Revocable hierarchical identity-based encryption: history-free update, security against insiders, and short ciphertexts
- Efficient subtree-based encryption for fuzzy-entity data sharing
- Revocable hierarchical identity-based encryption
- Dual trapdoor identity-based encryption with keyword search
- Tightly secure hierarchical identity-based encryption
- A fully distributed hierarchical attribute-based encryption scheme
- Hierarchical ID-Based Cryptography
- Signatures in hierarchical certificateless cryptography: efficient constructions and provable security
- Forward-secure identity-based encryption with direct chosen-ciphertext security in the standard model
- Indifferentiable deterministic hashing to elliptic and hyperelliptic curves
- Several security schemes constructed using ECC-based self-certified public key cryptosystems
- Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys
- Hierarchical Identity-Based Broadcast Encryption
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4737264)